| Publication | Date of Publication | Type |
|---|
| Logic, probability, and privacy: a framework for specifying privacy requirements | 2026-01-14 | Paper |
Aggregation of meta-technology ratio in DEA framework using the evidential reasoning approach INFOR: Information Systems and Operational Research | 2024-02-08 | Paper |
Steiner problems on directed acyclic graphs Lecture Notes in Computer Science | 2024-01-29 | Paper |
Backaction Evading and Amplification of Weak Force Signal in an Optomechanical System Annalen der Physik | 2023-11-23 | Paper |
A high-order deferred correction method for the solution of free boundary problems using penalty iteration, with an application to American option pricing Journal of Computational and Applied Mathematics | 2023-07-21 | Paper |
Leader–follower consensus for nonlinear multi-agent systems with unknown measurement sensitivities International Journal of Systems Science. Principles and Applications of Systems and Integration | 2023-07-04 | Paper |
| A positivity-preserving unigrid method for elliptic PDEs | 2023-06-05 | Paper |
Efficiency evaluation of a two-stage production process with feedback: an improved DEA model INFOR: Information Systems and Operational Research | 2023-03-17 | Paper |
Study on seafloor hydrothermal systems circulation flow and heat transfer characteristics Mathematical Biosciences and Engineering | 2023-02-28 | Paper |
Leader-following consensus for lower-triangular nonlinear multi-agent systems with unknown controller and measurement sensitivities Kybernetika | 2023-02-21 | Paper |
Network data envelopment analysis with two-level maximin strategy RAIRO - Operations Research | 2022-09-15 | Paper |
Performance evaluation of the Chinese high-tech industry: a two-stage DEA approach with feedback and shared resource Journal of Industrial and Management Optimization | 2022-08-23 | Paper |
| On the capacity dimension of the boundary of \(\mathrm{CAT}(0)\) spaces | 2021-10-05 | Paper |
On the capacity dimension of the boundary of \(\mathrm{CAT}(0)\) spaces (available as arXiv preprint) | 2021-10-05 | Paper |
On the asymptotic linear convergence speed of Anderson acceleration applied to ADMM Journal of Scientific Computing | 2021-08-24 | Paper |
Design of an unmatching observer-based controller for discrete-time fuzzy systems with time delay Discrete Dynamics in Nature and Society | 2020-10-14 | Paper |
| Study on optimal distribution of urban public service facilities based on supply-demand balance theory | 2020-01-22 | Paper |
On the capacity dimension of the boundary of CAT(0) spaces (available as arXiv preprint) | 2019-04-02 | Paper |
Design of distributed PID-type dynamic matrix controller for fractional-order systems International Journal of Systems Science. Principles and Applications of Systems and Integration | 2018-05-03 | Paper |
APC: A Novel Memory Metric and Measurement Methodology for Modern Memory Systems IEEE Transactions on Computers | 2017-06-20 | Paper |
Real-time sequence transmission problem Proceedings of the tenth annual ACM symposium on Principles of distributed computing - PODC '91 | 2015-06-19 | Paper |
A logical framework for privacy-preserving social network publication Journal of Applied Logic | 2014-04-24 | Paper |
Global well-posedness and scattering for the nonstandard defocusing beam equation Nonlinear Analysis. Theory, Methods & Applications. Series A: Theory and Methods | 2014-01-29 | Paper |
Heterogeneous subset sampling Lecture Notes in Computer Science | 2010-07-20 | Paper |
Intrusion detection system with hybrid detector Journal of Computer Applications | 2009-11-10 | Paper |
| Application of fuzzy multilevel comprehensive evaluation method in function | 2009-10-12 | Paper |
An approximation algorithm and dynamic programming for reduction in heterogeneous environments Algorithmica | 2009-06-17 | Paper |
| The improvement and application of AHP based optimal transfer matrix | 2009-03-06 | Paper |
A GrC-Based Approach to Social Network Data Protection Rough Sets and Current Trends in Computing | 2008-11-13 | Paper |
Value versus damage of information release: a data privacy perspective International Journal of Approximate Reasoning | 2006-12-07 | Paper |
Data and Applications Security XIX Lecture Notes in Computer Science | 2006-11-01 | Paper |
| A network anomaly detector based on the D-S evidence theory | 2006-07-12 | Paper |
Two variations of the minimum Steiner problem Journal of Combinatorial Optimization | 2005-05-17 | Paper |
| scientific article; zbMATH DE number 2044527 (Why is no real title available?) | 2004-02-18 | Paper |
| scientific article; zbMATH DE number 1941236 (Why is no real title available?) | 2003-06-29 | Paper |
| scientific article; zbMATH DE number 1927354 (Why is no real title available?) | 2003-06-12 | Paper |
Rooted spanning trees in tournaments Graphs and Combinatorics | 2002-07-22 | Paper |
On avoidable and unavoidable claws Discrete Mathematics | 2000-11-02 | Paper |
On the bounded domination number of tournaments Discrete Mathematics | 2000-06-21 | Paper |
The strong Hall property and symmetric chain orders Discrete Mathematics | 2000-03-13 | Paper |
| Onk-ary spanning trees of tournaments | 1999-11-14 | Paper |
| scientific article; zbMATH DE number 1300228 (Why is no real title available?) | 1999-10-17 | Paper |
| scientific article; zbMATH DE number 1349071 (Why is no real title available?) | 1999-10-07 | Paper |
| scientific article; zbMATH DE number 1222835 (Why is no real title available?) | 1999-03-22 | Paper |